Information Flow
Overview Entropy and Uncertainty Information Flow Models Confinement Flow Model Compiler-Based Mechanisms
Entropy Uncertainty of a value, as measured in bits Example: X value of fair coin toss; X could be heads or tails, so 1 bit of uncertainty Therefore entropy of X is H(X) = 1 Formal definition: random variable X, values x1, …, xn; so i p(X = xi) = 1 H(X) = –i p(X = xi) lg p(X = xi) Computer Security: Art and Science ©2002-2004 Matt Bishop
Computer Security: Art and Science Heads or Tails? H(X) = – p(X=heads) lg p(X=heads) – p(X=tails) lg p(X=tails) = – (1/2) lg (1/2) – (1/2) lg (1/2) = – (1/2) (–1) – (1/2) (–1) = 1 Consistent with intuitive result Computer Security: Art and Science ©2002-2004 Matt Bishop
n-Sided Fair Die H(X) = –i p(X = xi) lg p(X = xi) As p(X = xi) = 1/n, this becomes H(X) = –i (1/n) lg (1/ n) = –n(1/n) (–lg n) so H(X) = lg n which is the number of bits in n, as expected Computer Security: Art and Science ©2002-2004 Matt Bishop
Computer Security: Art and Science Ann, Pam, and Paul Ann, Pam twice as likely to win as Paul W represents the winner. What is its entropy? w1 = Ann, w2 = Pam, w3 = Paul p(W= w1) = p(W= w2) = 2/5, p(W= w3) = 1/5 So H(W) = –i p(W = wi) lg p(W = wi) = – (2/5) lg (2/5) – (2/5) lg (2/5) – (1/5) lg (1/5) = – (4/5) + lg 5 ≈ –1.52 If all equally likely to win, H(W) = lg 3 = 1.58 Computer Security: Art and Science ©2002-2004 Matt Bishop
Computer Security: Art and Science Joint Entropy X takes values from { x1, …, xn } i p(X=xi) = 1 Y takes values from { y1, …, ym } i p(Y=yi) = 1 Joint entropy of X, Y is: H(X, Y) = –j i p(X=xi, Y=yj) lg p(X=xi, Y=yj) Computer Security: Art and Science ©2002-2004 Matt Bishop
Computer Security: Art and Science Example X: roll of fair die, Y: flip of coin p(X=1, Y=heads) = p(X=1) p(Y=heads) = 1/12 As X and Y are independent H(X, Y) = –j i p(X=xi, Y=yj) lg p(X=xi, Y=yj) = –2 [ 6 [ (1/12) lg (1/12) ] ] = lg 12 Computer Security: Art and Science ©2002-2004 Matt Bishop
Computer Security: Art and Science Conditional Entropy X takes values from { x1, …, xn } i p(X=xi) = 1 Y takes values from { y1, …, ym } i p(Y=yi) = 1 Conditional entropy of X given Y=yj is: H(X | Y=yj) = –i p(X=xi | Y=yj) lg p(X=xi | Y=yj) Conditional entropy of X given Y is: H(X | Y) = –j p(Y=yj) i p(X=xi | Y=yj) lg p(X=xi | Y=yj) Computer Security: Art and Science ©2002-2004 Matt Bishop
Computer Security: Art and Science Example X roll of red die, Y sum of red, blue roll Note p(X=1|Y=2) = 1, p(X=i|Y=2) = 0 for i ≠ 1 If the sum of the rolls is 2, both dice were 1 H(X|Y=2) = –i p(X=xi|Y=2) lg p(X=xi|Y=2) = 0 Note p(X=i,Y=7) = 1/6 If the sum of the rolls is 7, the red die can be any of 1, …, 6 and the blue die must be 7–roll of red die H(X|Y=7) = –i p(X=xi|Y=7) lg p(X=xi|Y=7) = –6 (1/6) lg (1/6) = lg 6 Computer Security: Art and Science ©2002-2004 Matt Bishop
Overview Entropy and Uncertainty Information Flow Models Confinement Flow Model Compiler-Based Mechanisms
Bell-LaPadula Model Information flows from A to B iff B dom A TS{R,P} TS{P} TS{R} S{R} S{P} S{}
Entropy-Based Analysis Question: Can we learn something about the value of x by observing its effect on y? If so, then information flows from x to y.
Entropy-Based Analysis Consider a command sequence that takes a system from state s to state t xs is the value of x at state s (likewise for xy, ys, yt) H(a | b) is the uncertainty of a given b Def: A command sequence causes a flow of information from x to y if H(xs | yt) < H(xs | ys). Note: If y does not exist in s, then H(xs | ys) = H(xs)
Example Flows y := x H(xs | yt) = 0 tmp := x; y := tmp;
Another Example if (x==1) then y:= 0 else y := 1 Suppose x is equally likely to be 0 or 1, so H(xs) = 1 But, H(xs | yt) = 0 So, H(xs | yt) < H(xs | ys) = H(xs) Thus, information flows from x to y. Def. An implicit flow of information occurs when information flows from x to y without an explicit assignment of the form y := f(x)
Requirements for Information Flow Models Reflexivity: information should flow freely among members of a class Transitivity: If b reads something from c and saves it, and if a reads from b, then a can read from c A lattice has a relation R that is reflexive and transitive (and antisymmetric)
Information Flow Models An Information flow policy I is a triple I = (SCI, I, joinI), where SCI is a set of security classes, I is an ordering relation on the elements of SCI, and joinI combines two elements of SCI Example: Bell-LaPadula has security compartments for SCI, dom for I and lub as joinI
Overview Entropy and Uncertainty Information Flow Models Confinement Flow Model Compiler-Based Mechanisms
Confinement Flow Model Associate with each object x a security class x Def: The confinement flow model is a 4-tuple (I, O, confine, ) in which I = (SCI, I, join I) is a lattice-based info. flow policy O is a set of entities : O O is a relation with (a, b) iff information can flow from a to b for each a O, confine(a) is a pair (aL, aU) SCI SCI, with aL I aU if x I aU then information can flow from x to a if aL I x the information can flow from a to x
Example Confinement Model Let a, b, and c O confine(a) = [CONFIDENTIAL, CONFIDENTIAL] confine(b) = [SECRET, SECRET] confine(c) = [TOPSECRET, TOPSECRET] Then a b, a c, and b c are the legal flows
Another Example Let a, b, and c O confine(a) = [CONFIDENTIAL, CONFIDENTIAL] confine(b) = [SECRET, SECRET] confine(c) = [CONFIDENTIAL, TOPSECRET] Then a b, a c, b c , c a , and c b are the legal flows Note that b c and c a, but information cannot flow from b to a because bL I aU is false So, transitivity fails to hold
Overview Entropy and Uncertainty Information Flow Models Confinement Flow Model Compiler-Based Mechanisms
Complier-Based Mechanisms Assignment statements Compound statements Conditional statements Iterative statements
Assignment Statements y := f(x1, ..., xn) Requirement for information flow to be secure is: lub {x1, ..., xn} y Example: x := y + z; lub{y, z} x
Compound Statements begin S1; ... Sn; end; Requirement for information flow to be secure: S1 secure AND ... AND Sn secure
Conditional Statements if f(x1, ..., xn) then S1; else S2; end; Requirement for information flow to be secure: S1 secure AND S2 secure AND lub{x1, ..., xn} glb{y | y is the target of an assignment in S1 or S2}
Example Conditional Statement if x + y < z then a := b; else d := b * c - x; end; b a for S1 lub{b, c, x} d for S2 lub{x, y, z} glb{a, d} for condition
Iterative Statements while f(x1, ..., xn) do S; Requirement for information flow to be secure: Iteration terminates S secure lub{x1, ..., xn} glb{y | y is the target of an assignment in S}
Example Iteration Statement while i < n do begin a[i] := b[i]; /* S1 */ i := i + 1; /* S2 */ end; Loop must terminate (which it does) Body must be secure lub{i, b[i]} a[i] for S1 i i for S2 (so S2 is secure) lub{i, b[i]} a[i] for whole body (compound statement) lub{i, n} glb{a[i], i} must hold Requirements can be combined – homework